wireless application protocol

54
Wireless Application Protocol GSM Architecture

Upload: bryant

Post on 05-Jan-2016

28 views

Category:

Documents


1 download

DESCRIPTION

Wireless Application Protocol. GSM Architecture. Development of the GSM Standard. 1982: Groupe Spécial Mobile (GSM) created 1985 : List of recommendations are settled and intensely supported by the industry. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Wireless Application Protocol

Wireless Application Protocol

GSM Architecture

Page 2: Wireless Application Protocol

Development of the GSM Standard

1982: Groupe Spécial Mobile (GSM) created

1985: List of recommendations are settled and intensely supported by the industry.

1987: Initial aside the drafting of technical specifications was signed by network operators of 13 countries:

• time-scales for the procurement and deployment, • compatibly of numbering and routing plans, • tariff principles and definition of accounting.

1990: • The GSM specifications for the 900 MHz are frozen.

• Specifications start for the 1800 MHz GSM systems.

• GSM stands as

"Global System for Mobile communications"

Page 3: Wireless Application Protocol

Development of the GSM Standard

1991: First system trial are running. 1992: Official commercial launch of GSM service in

Europe. 1993: - The GSM-MoU has 62 signatories in 39 countries worldwide. In addition 32 applicants in 19 others

countries. - GSM network are operational in Europe. - First commercial services also start outside Europe. - One million subscribers to GSM networks. 1995: Specification of GSM phase 2 are frozen.

Page 4: Wireless Application Protocol

GSM History

Page 5: Wireless Application Protocol

GSM History

Page 6: Wireless Application Protocol

Basic Network Overview

A GSM system is basically designed as a combination of three major subsystems:

Network SubSystem (NSS) Base station SubSystem (BSS), Operation SubSystem (OSS).

Page 7: Wireless Application Protocol

Basic Network Overview

Page 8: Wireless Application Protocol

Network switching system (SS) is responsible for performing call processing and subscriber-

related functions.

– base station system (BSS), All radio-related functions are performed in the BSS, which

consists of base station controllers (BSCs) and the base transceiver stations (BTSs).

– operation and support system (OSS). the functional entity from which the network operator monitors

and controls the system. To offer the customer cost-effective support for centralized,

regional, and local operational and maintenance activities that are required for a GSM network.

The GSM network is divided into three major systems

Page 9: Wireless Application Protocol

Basic Network Overview

Page 10: Wireless Application Protocol

GSM System Architecture-IGSM System Architecture-I

Mobile Station (MS)Mobile Equipment (ME)Subscriber Identity Module (SIM)

Base Station Subsystem (BSS)Base Transceiver Station (BTS)Base Station Controller (BSC)

Network Switching Subsystem(NSS)Mobile Switching Center (MSC)Home Location Register (HLR)Visitor Location Register (VLR)Authentication Center (AUC)Equipment Identity Register (EIR)

Page 11: Wireless Application Protocol

Basic Network Overview

Page 12: Wireless Application Protocol

System ArchitectureSystem ArchitectureMobile Station (MS) Mobile Station (MS)

Mobile Equipment

Portable,vehicle mounted, hand held device Uniquely identified by an IMEI (International Mobile

Equipment Identity) Voice and data transmission Monitoring power and signal quality of surrounding

cells for optimum handover Power level : 0.8W – 20 W 160 character long SMS.

Page 13: Wireless Application Protocol

System ArchitectureSystem ArchitectureMobile Station (MS) contd.Mobile Station (MS) contd.

Subscriber Identity Module (SIM)

Smart card contains the International Mobile Subscriber Identity (IMSI)

Allows user to send and receive calls and receive other subscribed services

Encoded network identification details - Key Ki,Kc and A3,A5 and A8 algorithms Protected by a password or PIN Can be moved from phone to phone – contains key information

to activate the phone

Page 14: Wireless Application Protocol

System ArchitectureSystem ArchitectureMobile Station (MS) contd.Mobile Station (MS) contd.

Page 15: Wireless Application Protocol

System ArchitectureSystem ArchitectureMobile Station (MS) contd.Mobile Station (MS) contd.

Each mobile station has an International Mobile Equipment Identity (IMEI) that is permanently stored in the mobile unit. Upon request, the MS sends this number over the signaling channel to the network. The IMEI is used to identify mobile units that are reported stolen or operating incorrectly.

The SIM-Card is a removable smart card, the size of a credit card, and contains an integrated circuit chip with a microprocessor, random access memory, and read-only memory.

Page 16: Wireless Application Protocol

Subscriber Identification

The International Mobile Subscriber Identity (IMSI) is the primary identification of the subscriber within the GSM network and is permanently assigned to him.

Page 17: Wireless Application Protocol

Basic Network Overview

Page 18: Wireless Application Protocol

System ArchitectureSystem ArchitectureBase Station Subsystem (BSS)Base Station Subsystem (BSS)

Base Station Subsystem is composed of two parts that communicate across the standardized Abis interface allowing operation between components made by different suppliers

1. Base Transceiver Station (BTS)

2. Base Station Controller (BSC)

Page 19: Wireless Application Protocol

System ArchitectureSystem ArchitectureBase Station Subsystem (BSS) Base Station Subsystem (BSS)

Base Station Controller (BSC)

Manages Radio resources for BTS Assigns Frequency and time slots for all MS’s in its area Handles call set up Transcoding and rate adaptation functionality Handover for each MS Radio Power control It communicates with MSC and BTS

Page 20: Wireless Application Protocol

System ArchitectureSystem ArchitectureBase Station Subsystem (BSS) Base Station Subsystem (BSS)

Base Transceiver Station (BTS):

Encodes,encrypts,multiplexes,modulates and feeds the RF signals to the antenna.

Frequency hopping Communicates with Mobile station and BSC Consists of Transceivers (TRX) units

Page 21: Wireless Application Protocol

System ArchitectureSystem ArchitectureNetwork Switching Subsystem(NSS)Network Switching Subsystem(NSS)

Mobile Switching Center (MSC)

Heart of the network Manages communication between GSM and other networks Call setup function and basic switching Call routing Billing information and collection Mobility management

- Registration- Location Updating- Inter BSS and inter MSC call handoff

MSC does gateway function while its customer roams to other network by using HLR/VLR.

Page 22: Wireless Application Protocol

Basic Network Overview

Page 23: Wireless Application Protocol

NSS Architecture

Home Location Register (HLR)– A database used for storage and management of

subscriptions. – data about subscribers, including a subscriber's

service profile, location information, and activity status.

– When an individual buys a subscription, he or she is registered in the HLR of that operator.

Page 24: Wireless Application Protocol

NSS Architecture

Visitor Location Register (VLR)– A database that contains temporary information about

subscribers that is needed by the MSC in order to service visiting subscribers.

– The VLR is always integrated with the MSC.– For roaming user, VLR connected to that MSC will request

data about the mobile station from the HLR through MSC.– The Visitor Location Register (VLR) memorizes

information about the subscribers physically present in a geographic area. If a subscriber leaves this area, this information is stored in the VLR of another MSC.

Page 25: Wireless Application Protocol

System ArchitectureSystem ArchitectureNetwork Switching Subsystem Network Switching Subsystem

Authentication Center (AUC)

- Protects against intruders in air interface- Maintains authentication keys and algorithms and provides

security triplets ( RAND,SRES,Kc)- Generally associated with HLR

- Provides authentication and encryption parameters that verify the user's identity and ensure the confidentiality of each call.

Page 26: Wireless Application Protocol

System ArchitectureSystem ArchitectureNetwork Switching SubsystemNetwork Switching Subsystem

Equipment Identity Register (EIR)

- Database that is used to track handsets using the IMEI (International Mobile Equipment Identity)

- Made up of three sub-classes: The White List, The Black List and the Gray List

- Only one EIR per PLMN A database that contains information about the identity of mobile

equipment that prevents calls from stolen, unauthorized, or defective mobile stations

Page 27: Wireless Application Protocol

GSM Netwrok

Following is the diagram of GSM Netwrok alongwith added elements.

Page 28: Wireless Application Protocol

GSM network areas

In a GSM network, the following areas are defined: Cell: Cell is the basic service area: one BTS covers one cell. Each cell is given a

Cell Global Identity (CGI), a number that uniquely identifies the cell. Location Area: A group of cells form a Location Area. This is the area that is

paged when a subscriber gets an incoming call. Each Location Area is assigned a Location Area Identity (LAI). Each Location Area is served by one or more BSCs.

When the MS is in Idle mode, the network do not knows the cell but only the Location Area where the MS is located.

Area in which a MS moves freely with updating its current location. MSC/VLR Service Area: The area covered by one MSC is called the

MSC/VLR service area. PLMN: The area covered by one network operator is called PLMN. A PLMN

can contain one or more MSCs.

Page 29: Wireless Application Protocol

Call from Mobile Phone to PSTN:

When a mobile subscriber makes a call to a PSTN telephone subscriber, the following sequence of events takes place:

1. The MSC/VLR receives the message of a call request. 2. The MSC/VLR checks if the mobile station is authorized to access the network. If so,

the mobile station is activated. If the mobile station is not authorized, service will be denied.

3. MSC/VLR analyzes the number and initiates a call setup with the PSTN. 4. MSC/VLR asks the corresponding BSC to allocate a traffic channel (a radio channel

and a time slot). 5. The BSC allocates the traffic channel and passes the information to the mobile station. 6. The called party answers the call and the conversation takes place. 7. The mobile station keeps on taking measurements of the radio channels in the present

cell and neighboring cells and passes the information to the BSC. The BSC decides if handover is required, if so, a new traffic channel is allocated to the mobile station and the handover is performed. If handover is not required, the mobile station continues to transmit in the same frequency.

Page 30: Wireless Application Protocol

Call from PSTN to Mobile Phone:

When a PSTN subscriber calls a mobile station, the sequence of events is as follows:

1. The Gateway MSC receives the call and queries the HLR for the information needed to route the call to the serving MSC/VLR.

2. The GMSC routes the call to the MSC/VLR. 3. The MSC checks the VLR for the location area of the MS. 4. The MSC contacts the MS via the BSC through a broadcast message,

that is, through a paging request. 5. The MS responds to the page request. 6. The BSC allocates a traffic channel and sends a message to the MS to

tune to the channel. The MS generates a ringing signal and, after the subscriber answers, the speech connection is established.

7. Handover, if required, takes place,

Page 31: Wireless Application Protocol
Page 32: Wireless Application Protocol

Handoff Strategies

The subscriber transitions from one radio channel to another as he moves from one cell to another while engaged in a conversation.

It means in mobile communication handovers is refer to the transformation of an ongoing call or data from one channel to another which are connected to the core network.

It enables the users of cellular technology to receive their calls anywhere and at any time so this process provides the mobility to the users, making it possible to the users to roam seamlessly from one cell to another cell.

Page 33: Wireless Application Protocol

Handoff Strategies

During an ongoing communication of a user when the user crosses the cell boundary it is better to use the radio resources of the new cell also called the target cell because the strength of signal in the preceding cell is weaker than the next one that is the target-cell. Now the whole process of the terminating of connection of user from previous cell and establishing the new connection to target cell is called handover

Page 34: Wireless Application Protocol

Why need of handovers ?

The handover process is needed when the following situations occurs.

 When the motion of the MS is very fast. The movement of the MS from one cell to

another during an ongoing session. The experience of interference phenomenon

by the user’s equipment from the near cell.

Page 35: Wireless Application Protocol

Handover

Page 36: Wireless Application Protocol

The Five Types of Handover

1- Intra-Cell Handover: the MS is handed over to another channel on the same cell, under the same BTS.

2- Intra-BTS Handover: the MS is handed over to another channel on a different cell, under the control of the same BTS.

3- Intra-BSC Handover: the MS is handed over to another channel on a different cell, under the control of a different BTS of the same BSC.

4- Inter-BSC Handover: the MS is handed over to another channel on a different cell, under the control of a different BSC of the same MSC.

5- Inter-MSC Handover: the MS is handed over to another channel on different cell, under another MSC of the same PLMN.

Page 37: Wireless Application Protocol

Types of Handover

Hard Handoff: In hard handoff process the channel in the source cell is release before connecting to the target cell. It is also known as (brake-before make).As in hard handoff the connection is break before connecting to other channel is a disadvantage but it is one channel at a time is the advantage, other advantage Is the hardware have no need to be compatible of receiving two or more channels

Page 38: Wireless Application Protocol

Types of Handover

Soft Handoff: In Soft Handoff the channel in the target cell ins

connected before releasing the source channel. The user is connected with both channels for a while. It is known as make before break. The time for which both channels are used in parallel is short. The advantage of soft handoff Is the chance of call termination is very low as it is make before break.

Page 39: Wireless Application Protocol

Handover Preparation

Page 40: Wireless Application Protocol

Handover Procedure

To avoid losing a call in progress, when the Mobile Station leaves the radio coverage of the cell in charge.

Procedure: Three steps: • Handover decision (based on measurements results). • Choice of the target cell. • Handover execution.

Page 41: Wireless Application Protocol

Handover Decision

An algorithm is use to select a set of criteria to divide when and which best network to handover

Handover is initiated by the network based on radio subsystem criteria (RF level, quality,distance) as well as network directed criteria (current traffic loading per cell, maintenance requests, etc.).

In order to determine if a handover is required, due to RF criteria, the MS shall take radio measurements from neighboring cells; these measurements are reported to the serving cell on a regular basis.

Page 42: Wireless Application Protocol

Handover Decision

Page 43: Wireless Application Protocol

Handover Execution

Page 44: Wireless Application Protocol

Handover Execution

In this last phase of handoff procedure messages are exchanged between the two networks for rerouting the user call to the new network. The preplanned approach is used for handoff execution all the three processes are for both the horizontal and vertical handoff.

Page 45: Wireless Application Protocol

Functions of the Radio Interface

Page 46: Wireless Application Protocol

Functions of the Radio Interface

The radio interface in the GSM system is responsible for maintaining communication between the fixed network and mobile subscribers.

The radio interface serves two major functions in the GSM system.

• To transport user information, both speech and data: . • To exchange signaling messages between the

mobile station and the network (e.g. call in progress indication and preparation and execution of handovers).

Page 47: Wireless Application Protocol
Page 48: Wireless Application Protocol

Control Channels

Control channels are intended to carry signaling or synchronization data. Three are defined: Broadcast Channels (BCHs), Common Control Channels (CCCHs), Dedicated Control

Channels (DCCHs). Broadcast channels are point to multipoint unidirectional (downlink)

control channels from the the fixed subsystem to the mobile telephone. • First, BCHs include a Frequency Control Channel (FCCH) that

allows an MS to accurately tune to a Base Transceiver Station (BTS). • Then BCHs contain the Synchronization Channel (SCH), which

provide TDMA frame oriented synchronization data to a MS. • Last, BCHs include the Broadcast Control Channel (BCCH)

intended to broadcast a variety of information to MSs, including cues necessary for the MS to register in the network.

Page 49: Wireless Application Protocol

Control Channels

Common Control Channels (CCCHs) are point to multipoint channels that is primarily intended to carry signaling information for access handling functions. The CCCHs include:

Paging Channel (PCH), which is down channel used to page (call terminating) MSs.

• Access Grant Channel (AGCH) that is a downlink channel used to assign a MS to a specific Dedicated Control Channel (DCCH).

• Cell Broadcast Channel (CBCH), which is down channel used to broadcast miscellaneous short messages to the MSs.

• Random Access Control Channel (RACH) is an uplink channel which allows MS to initiate a call.

Page 50: Wireless Application Protocol

Control Channels

Dedicated Control Channels are point to point, bi-directional control channel. Two types of DCCHs are used:

• Stand-alone Dedicated Control Channels (SDCCH) whose allocation is not linked to the assignment of a traffic channel (TCH). It bears information about authentication, location updates, and assignment to traffic channels (TCHs).

• Otherwise, Associated Control Channels are linked to the allocation of a traffic channel (TCH).

The Fast Associated Control Channel (FACCH) or burst stealing is a control channel obtained by preemptive dynamic multiplexing on a TCH.

The Slow Associated Control Channel (SACCH), also know as a continue data stream, is allocated together with a TCH or a SDCCH.

Page 51: Wireless Application Protocol

From Speech to Radio Transmission

Page 52: Wireless Application Protocol

From Speech to Radio Transmission

From speech to radio signal, several operations are performed. The reverse transformations are performed on the receiver side.

Main operations are the following: Digitizing: Speech blocks are first digitized to obtain digital blocks: 20

ms speech = 260 bits. Source coding uses low bit rate code for air interface. Channel coding uses codes enabling detection and correction of signals

errors. The result is a flow of code words (456 bits long). • Interleaving and burst formatting spread the bits of several code

words to expand data of the same block in different bursts. The results is a succession of blocks, one block for each channel burst.

Page 53: Wireless Application Protocol

From Speech to Radio Transmission

• Ciphering modifies the contents of these block through a "secret recipe" known only by the mobile

telephone and the Base Transceiver Station, thus protecting data from eavesdropping.

• Modulation transforms the binary signal into an analog signal at the right frequency and moment using Gaussian Minimum Shift Keying (GMSK).

• Transmission amplifies and radiates the resulting signal as radio waves via an antenna.

Page 54: Wireless Application Protocol

From Speech to Radio Transmission

• Diversity are different techniques used to provide the reception quality.

• Demodulation: From the radio waves captured by the antenna, the portion of the received signal which is of interest to the receiver is demodulated.

• Deciphering reverses the encryption "secret recipe". • Burst de-formatting and de-interleaving puts the bits of the

different burst back in order to rebuild the code words. • Channel Decoding reconstructs the source information from the

output of the demodulator using added redundancy to detect or correct possible errors.

• Speech decoding operates as suitable filters receiving the voice parameters, then performs them out analog speech.